Data Management & Security www.davidcorp.com 1.800.55.DAVID Data Management 2:15 - 2:45 p.m. Data Management – The Second Concern Moderator: David Tweedy, CMC, MBA, Director, Risk Management Information Systems, Bickmore www.davidcorp.com COMMIT Mark E. Dorn, President & CEO, DAVID Corporation Learn how to securely and efficiently store, access and manage information. This session will cover cloud versus on premises, Commercial Off The Shelf Software (COTS) systems, MS Office, custom solutions, other tools and applications, user interfaces, protecting information and IP, secure storage, backup and recovery. Question - Who Is Gregg Steinhafel ? Resigned From ? _______________________ For His Executive Management Responsibility Of ? _______________________ Involved How Many People ? 10,000 or 70M or 120M His Compensation For 2013 ? _______________________ www.davidcorp.com Answer - Who Is Gregg Steinhafel ? Resigned From Target Department Stores For His Executive Management Responsibility Of Data Breach Involved How Many People 70,000,000 His Compensation For 2013 $20,600,000 It’s Over Dog’s Compensation Likely Ongoing www.davidcorp.com It’s Wednesday…At Your RISK POOL 1. What Reports On Data Management Security Did You Review This Week? 2. What Is Your Funding Level For Data Management & Security? 3. If You Have A Data Breach (Lost/Stolen Data or Corrupted Data) Are You Sure You Are As Ready As Your Board & Members Expect? To Defend? To Respond? To Fix? www.davidcorp.com Hardware & Infrastructure Budgets www.davidcorp.com Many Of Us Have Info Security Programs (ISP) But how well do we understand data management & security risk? External Threats Security Internal Threats COMMIT Graphic Source: https://www.harlandclarke.com/dv/0909/07.php www.davidcorp.com Pools Exposed To Consumerization of IT 48% Of Employees Use Work PC’s For Personal www.davidcorp.com Pools Becoming A Borderless Enterprise Data has moved beyond the enterprise firewall: Laptops / Home Offices USB Sticks / WiFi / VPN and more… www.davidcorp.com Increasing Internal & Partner Data Risks At Pools Insiders & Partners have direct access to your most sensitive data 70% of all serious incidents are sparked by insiders. IDC Worldwide Security Products and Services Lost Laptops & Devices www.davidcorp.com How many Disgruntled Employees File Sharing Software of us use Drop Box? Where is Drop Box? IT Resourcing Models At Pools • Do It Yourself On Premise – Laptop/Workstation,WiFi Routers – On-premise server(s), data center • Hosting (use another’s resources) – Shared or Dedicated – Various Forms of Cloud – Co-location www.davidcorp.com Data Center Management Solutions Configuration Management Automated Provisioning and Updating of Physical and Virtual Environments Server Consolidation Through Virtualization www.davidcorp.com End to End Monitoring Proactive Platform Monitoring Application & Service Level Monitoring Interoperable and Extensible Platform Server Compliance Configuration Controls and Reporting Centralized Security Auditing Comprehensive Security & Identity and Access Mgmt Data Protection and Recovery Business Continuity Through Virtualization Mgmt Backup and Recovery of Physical and Virtual Resources Disaster Recovery End to End Monitoring Proactive platform, application and service-level monitoring • Challenges For Pools • • Capabilities • IT services, applications and servers must run smoothly Increasing pressure for service levels that ensure optimal uptime and responsiveness Proactively monitor availability, performance and configuration across heterogeneous platforms POOL Applications Databases Perform deep application and service-level monitoring Claims & Policy www.davidcorp.com Servers Other Apps Web Servers Portals FROI Concepts of ZERO Trust All resources are accessed in a secure manner regardless of location. Access control is on a “need-toknow” basis and is strictly enforced. Verify and never trust. Visibility: Inspect and log all traffic. The network is designed from the inside out. www.davidcorp.com Zero Trust Data Protection Policy-Based, Encryption-Enabled Data Protection. – Protect Data from Leakage and Theft: Enforce usage policies for all removable devices and media. – Increase Data Security: Define forced encryption policy for data flows onto removable devices / media. Flexible exception management. Ensure that data cannot be accessed if removable devices or media are lost or stolen. – Continuous Audit Readiness: Monitor all device usage and data transfers. Track all transferred files and content. Report on all data policy compliance and violations. www.davidcorp.com Example Secured Web Access • RSA SecurID® hardware tokens provide "hacker-resistant" two-factor authentication,for user identification. Based on time synchronization technology, this authentication device generates a simple, one-time authentication code that changes every 60 seconds. www.davidcorp.com Gardner Magic Quadrant Magic Quadrant for Web Fraud Detection www.davidcorp.com Data Management Access - Questions Q? - How do we (safely) provide access to, and maintenance of, all member data by both the pool and members? - Via Online & Portals This includes claims data, contact information, policy information, certificates, completed training, completed inspections, exposures, underwriting processes, and more. Q?- How do we (safely) and most efficiently manage data…. program structures, excess coverages and reinsurance, and track retentions and then provide quick access to program participation and retention levels? COMMIT www.davidcorp.com Data Security and Privacy Q? - How do we feel better (safer) about our security and privacy? We have policies and technology in place, but there are so many regulations, and so many changes. Security is an All-or-Nothing proposition = You are as secure as your weakest link. J. Bako, VP David Corp. COMMIT www.davidcorp.com Today’s Agenda – Data Management Security 1 Security 2 Pool Questions www.davidcorp.com Security – Part 1 Security 1 • Policy And Governance – Risks And Content • SOC II audits are generally the standard • Testing is against pre-defined security/trust principals • Governance is based upon higher standards • Network & Device Security • Network layer N/S/E/W security in a cloud environment • Authentication within the VPN • Common Deficiencies www.davidcorp.com COMMIT • Staff & Data Security Security – Part 2 Security 2 • Application Content • HIPAA & PII Data • Access Management and Authentication • Application Security • Data Center / Host System & Vendor Security COMMIT www.davidcorp.com Security 1 – Policy And Governance Security 1 Risks Of Policy Content Without defined security policies and standards, it may be difficult to comply with legal, regulatory and industry requirements or ensure protection of sensitive data. COMMIT www.davidcorp.com Security 1 – Policy And Governance Security 1 Policy Content Risk based plans should reference and/or utilize industry accepted standards/practices such as ISO, COBIT, ISACA, ITIL or NIST. Ex. National Inst. Of Standards And Technology Security policies should be published, and accessible to appropriate employees and contractors. COMMIT www.davidcorp.com Security 1 – Policy And Governance Security 1 For App Vendors, Hosting Sources & Client Personnel Is there a written policy for handling, storing and disposing of sensitive PHI/PII data? What documented procedures are in place for incident or similar security breech issues? What help desk or system administration procedures are in place for servicing user requesting password resets, new access rights or change of privileges? What policies exist for configuring servers or Virtual Machines (VM’s) What are the policies for VPN set up and access? What Network based Intrusion Detection Systems (NIDS) are part of the monitoring policy? What vulnerability assessment plan and schedule is in place? What external penetration plan and policy is in place? Without it you are non compliant. www.davidcorp.com Security 1 – Policy And Governance Security 1 Common Areas Of Policy Content Deficiency Patch Management Encryption Policy Human Resource Policy Access Control Incident Handling and Reporting Disposal of Resources System Backups Disaster Recovery www.davidcorp.com COMMIT 1. 2. 3. 4. 5. 6. 7. 8. Security 2 - Application Security Security 2 Define All Applications Content Areas…… 1. 2. 3. 4. 5. Purpose & Risks Users Profiles Qty Of Users Key Components (Web Servers, Server, Database, Appliances) Personal Identifiable Information (PII) or Protected Health Information (PHI) 6. Host/Data Store 7. Remote Access For App Management Required (ex VPN) For Routine Remote Data Delivery Needs www.davidcorp.com To Whom Does HIPAA Apply? • Business Associates – TPA’s, Bill Reviewers, RMIS Vendors Provides a service that involves the disclosure of protected health information Business Associates are now directly liable….. Organizations that “create, receive, maintain or transmit,” PHI data are BAs www.davidcorp.com What is Protected Health Information (PHI) Individually Identifiable List of 18 Identifiers • • • • • • • • • • • • • • • • • Names Geographic subdivisions smaller than State All elements of dates except year Phone & Fax numbers Electronic mail addresses Social Security numbers (SSN) Medical record numbers Health plan beneficiary numbers Account numbers Certificate/license numbers Vehicle identifiers and serial numbers Device identifiers and serial numbers; Web Universal Resource Locators (URLs); Internet Protocol (IP) address numbers; Biometric identifiers Full face photographic images Any other unique identifying number www.davidcorp.com Health Information Health information means any information, including genetic information, whether oral or recorded in any form or medium, that: (1) Is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and (2) Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual. Where Is The (PHI) Data In Your Pool Covered Entity Business Associate & Sub contractor • Health Plan & Clearinghouse • Health Care Provider (with electronic HIPAA transaction) • • • • • • • • • • • • • • • • www.davidcorp.com Claims processing or administration Data analysis, processing or administration Utilization review Quality assurance Patient safety activities Billing Benefit & Practice management Repricing Legal Actuarial Accounting Data aggregation Management Administrative Accreditation Financial HIPAA & Data Management How Does HIPAA Apply to Data Management And Hosting? A data storage company service provider that has access to protected health information (whether digital or hard copy) qualifies as a business associate, even if the entity does not view the information or only does so on a random or infrequent basis. -HIPAA Omnibus www.davidcorp.com 31 Need for IT Actions & Control Information system activity review (Required). 45 CFR § 164.308 (a) (1) (ii) (D) Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Standard: Documentation. 45 CFR § 164.316 (b) (1) (i) Maintain the policies and procedures implemented to comply with this subpart [SUBPART C – Security Standards for the Protection of Electronic PHI] in written (which may be electronic) form; and (ii) If an action, activity or assessment is required by this subpart to be documented, maintain a written (which may be electronic) record of the action, activity, or assessment. Time limit (Required). 45 CFR § 164.316 (b) (2) (i) Retain the documentation required by paragraph (b)(1) of this section for 6 years from the date of creation or date last was in effect, whichever is later. www.davidcorp.com Security 2 – Access Mgt & Authentication Security 2 Access Management & Authentication Content Areas Does the app or services allow ability to delegate user authentication or federated authentication? Does the app leverage enterprise authentication services (LDAP protocol, MS Active Directory) ? Does the app support password policy requirements (password expiration at 60,90,120 days, lock a user account in x login attempts, prevent users from reusing passwords, set minimum password length or complexity upper/lower case, lock out time period enforcement, force new users to change new first login passwords, use new password reset questions? Are usernames and passwords transmitted using encryption? Limit concurrent access for the same user account? Restrict access rights to privileges, user Id’s, job roles, job functions? www.davidcorp.com COMMIT Auto log off of a user based on inactivity? Security 2 - Application Security Security 2 Remote Access Does app have built-in functionality to provide remote access? Will remote app access by a vendor be required? Will remote app be ….web based, certified and non client involved? Can remote access users gain access to command line or script level access? Can the app or service restrict access to the app based on IP location? How does the remote hosting vendor test the application for SLA requirements? COMMIT www.davidcorp.com Security 2 - Application Security Security 2 Personnel Security Are background checks done on personnel who will have administrative access to servers, applications and data. How frequently? Do support personnel have security certifications (CISSP, GIAC, VSA) Do the staff have 5-7 years or more in network security? Does the staff have HIPAA training for access to PHI? Are written policies and procedures in place to require notification in X Days to clients when sensitive data has been compromised? www.davidcorp.com COMMIT What policies and procedures are in place when a hosting employee is terminated or his/her access is terminated Security 2 - Application Security Security 2 Data Center Security Is the Datacenter SAS 70 or SOC2 Type 2 Certified? Controlled Access, UPS In Place, Server Racks Locked SOC2 Report Available For Review And Updated? Who/how has ability to install critical OS, Web, browser and database security patches? What access logs are created and reviewed…and how often? Video Coverage in place and Logs of all access to the infrastructure equipment Backup and Restoration of data, how is this accomplished and is the process audited? Does the app vendor or host store data segregated from other customer data? Does the app vendor only store the data in the United States? Is data encrypted before sending it over Internet or open network? What type of encryption is used? Is it (Government) FIPS 140-2 Compliant? www.davidcorp.com COMMIT Does the app vendor completely delete data when a client officially deletes it from their web services? How many copies of my data are being collected? Security 2 - Application Security Security 2 Penetration testing report provided? Risk Absence of penetration testing may lead to non-compliance as per regulatory requirement and non-identification of system vulnerabilities. Recommendation Penetration testing should be performed on regular basis to identify any potential weakness in the environment. COMMIT www.davidcorp.com Security 2 - Application Security Security 2 Application Security For Applications Do third parties conduct security assessments on your application or service? When was the last review? Are all web applications and web admin access programs developed based on secure coding guidelines like Open Web Application Security Project Guide, WASC Threat Classification or SANS Top 20? Does the app verify all parameters are validated or encoded before being included on a web page (XXS) Does the application check for SQL injection flaws when user data is entered Does the app prevent attacker from direct manipulation of object references like files, directories, database records via the url www.davidcorp.com COMMIT Does the app check and prevent remote file inclusion (RFI) Security 2 - Application Security Security 2 MITRE maintains the CWE (Common Weakness Enumeration) web site, with the support of the US Department of Homeland Security's National Cyber Security Division, presenting detailed descriptions of the top 25 Software errors along with authoritative guidance for mitigating and avoiding them. That site also contains data on more than 700 additional Software errors, design errors and architecture errors that can lead to exploitable vulnerabilities. COMMIT www.davidcorp.com Security 2 - Application Security Security 2 COMMIT www.davidcorp.com Security 2 - Application Security Security 2 COMMIT www.davidcorp.com Security 2 - Application Security Security 2 Application Security For Web Applications Does the app check for and require authorization token submission by the browser Is the app tested to make sure info not leaked via error messages Does the app or service support SSL v3/TLS Does the app use IP ports 80 and 443 http / https Does the app have controls to prevent direct data manipulation Does the app record in an audit file all direct access to the database Is a web scanning tool run on the app regularly Is the app supported by certified web programmers – GSSP Secure Software Programmer www.davidcorp.com COMMIT Security 2 - Application Security Security 2 Host Security Is enterprise antivirus, anti-spyware and host intrusion prevention software installed How/who is installing critical O/S, web, browser and database security patches within x days of release? Who/how are local administrator level rights managed? Who/how are clients notified if a security breach occurs with application or hosting service? How much up time is expected? What is the typical down time and recovery time? Is the hosting service security program audited and certified? www.davidcorp.com COMMIT Is the app hosted with other app clients on the same server or is the server single tenant? Security 2 - The Fog About Cloud & SaaS Negative Issues With SaaS • • • • • Doesn’t Make Integration Work Easier (HR/WC) Doesn’t Auto Integrate With Other SaaS Apps Costs Are Not Always Less Than Licensed or Hosted Organization Integration Needs Often Consumer Oriented Functionality (Ex. Facebook Login) Positive Issues With SaaS • • • • • • Common Code Base & Easier Upgrades Mobile & Easy Initial Deployment Pay As You Go Model Scalability Simple Disaster Recovery Geo Replication www.davidcorp.com Security 2 Data Management In Pools – Top Goals Find Your Blend High Performance Security Data Management Privacy Compliance www.davidcorp.com Don’t Be A Target Member Questions www.davidcorp.com 1.800.55.DAVID Disaster Recovery Questions 3 Q? How do we really give Disaster Recovery a good test? Disaster Recovery Testing is not a single occurrence or event; it is an ongoing process. Test for system failure, data theft and data corruption. In some cases, the cost of maintaining a Disaster Recovery mindset and performing Simulation Testing can actually outweigh the risk and cost of an actual disaster. Focus on the anticipated types of disasters, probability of occurrence, and projected damage associated to better understand the actual financial impact. The results can then be weighed against the cost of an accommodating Disaster Recovery Plan to ensure financial feasibility. COMMIT www.davidcorp.com Personal Identifiable Information (PII) Questions 3 Q. How do we keep personal identifiable information (PII) out of the e-mail system? Reduce the risk of exposure is to look towards alternate communication mechanisms altogether, understanding email is a highly insecure platform by nature and often overused. When there is no alternative but to email PII, measures should be taken to use either message- or transport-based encryption. COMMIT www.davidcorp.com Data Management Solutions Questions 3 Are there solutions to better help support the following member management activities? Manage program Manage and track Manage and track participation membership member in training, return to start and stop contributions; work or triage www.davidcorp.com programs, EAP programs, or other pool activities and determine and provide ex-mods COMMIT dates, retentions, locations and contacts Data Management Risk Questions • Are there new Threats? • Do I have new Vulnerabilities? • Is there an increased Likelihood of Occurrence? • Has the Impact increased? www.davidcorp.com Questions 3 Q? - Guidance on When to Use Cloud? • Cloud can also be a way to increase IT resources in line with your business needs. – Ramp up resources when you need more – Ramp down resources when not needed – Avoid on-going capital outlays • Cloud Can Be A Tool for Risk Management – – – – Assume Reduce/Control/Mitigate Transfer Avoid www.davidcorp.com Questions 3 Adjourn www.davidcorp.com 1.800.55.DAVID When to Use IT Data Architecture? High Control / Mitigate Avoid Likelihood Combination of Risk Transfer , Control /Mitigation, Avoidance, or Assumption Depends on Organizational Capabilities and Risk Tolerance Low Transfer Assume Low High Impact www.davidcorp.com